ABSTRACT

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints and the rapid expansion of cloud strategies arising from the COVID-19 pandemic increase an organization’s attack surface. When combined with limited resources caused by the cybersecurity skills gap, securing small and mid-sized business IT infrastructures becomes more complicated. With limited staffing and budgetary restrictions, small businesses need to create cost-effective, security-driven programs that protect data while also meeting increasingly stringent compliance requirements.

This book bridges the gap between complex technical language and business objectives to create a security-first review of the security and compliance landscapes. Starting from the premise that “with security comes compliance,” this book starts by defining “security-first” and then walking readers through the process of creating a holistic security and compliance program.

Looking at security and privacy through the lens of zero trust, this overview of regulations and industry standards provides both background about and implications drawn from modern security practices. Rather than focusing solely on individual cybersecurity frameworks, this book offers insights into best practices based on the commonalities between regulations and industry standards, highlighting some of the primary differences to show the nuances.

Woven throughout are practical examples of solutions that enable small and mid-sized businesses to create “cybersustainable” security-focused policies, processes, and controls that protect today’s future for tomorrow’s digital ecosystem.

chapter 1|16 pages

Into the Mind of a Malicious Actor

chapter 2|21 pages

Reviewing the Compliance Landscape

chapter 3|18 pages

Compliance Risk

chapter 4|19 pages

Looking at Risk through a Security Lens

chapter 5|16 pages

How to Set Controls

chapter 6|19 pages

Continuous Monitoring

chapter 7|13 pages

Vendor Risk Management

Securing the Supply Chain

chapter 8|11 pages

Calculating the Total Cost of Compliance

chapter 9|14 pages

Information Security Audit

The What, How, and Why

chapter 10|13 pages

Cyber Liability Insurance

chapter 11|10 pages

Cybersustainability

Ethical Data Handling for Corporate Responsibility

chapter 12|12 pages

Magic 8 Ball Says “Yes”